rhel10/firefox-flatpak

Direct Vulnerabilities

Known vulnerabilities in the rhel10/firefox-flatpak package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Expired Pointer Dereference

*
  • M
Use of Out-of-range Pointer Offset

*
  • H
Expired Pointer Dereference

*
  • H
Out-of-bounds Write

*
  • H
Incorrect Calculation of Buffer Size

*
  • H
Incorrect Privilege Assignment

*
  • H
Access of Uninitialized Pointer

*
  • H
Access of Uninitialized Pointer

*
  • H
Expired Pointer Dereference

*
  • H
Access of Uninitialized Pointer

*
  • H
Expired Pointer Dereference

*
  • M
Improperly Implemented Security Check for Standard

*
  • M
Out-of-bounds Write

*
  • M
Incorrect Privilege Assignment

*
  • L
Incorrect Calculation of Buffer Size

*
  • M
Improper Handling of File Names

*
  • M
Improper Restriction of Rendered UI Layers or Frames

*
  • M
Incorrect Privilege Assignment

*
  • M
Expected Behavior Violation

*
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Write

*
  • M
Use of Potentially Dangerous Function

*
  • M
Exposure of Private Information ('Privacy Violation')

*
  • M
Buffer Access with Incorrect Length Value

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • H
Integer Overflow or Wraparound

*
  • M
Incorrect Privilege Assignment

*
  • H
Expired Pointer Dereference

*
  • L
Buffer Access with Incorrect Length Value

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Access of Uninitialized Pointer

*
  • M
Access of Uninitialized Pointer

*
  • M
Exposure of Private Information ('Privacy Violation')

*
  • M
Use of Out-of-range Pointer Offset

*
  • M
Out-of-bounds Write

*
  • L
Undefined Behavior for Input to API

*
  • M
Out-of-bounds Write

*
  • M
Undefined Behavior for Input to API

*
  • M
Compiler Optimization Removal or Modification of Security-critical Code

*
  • H
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Write

*
  • H
Buffer Overflow

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*
  • M
Expired Pointer Dereference

*
  • H
Insufficient Compartmentalization

*
  • M
Out-of-bounds Write

*
  • H
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

*
  • H
Compiler Optimization Removal or Modification of Security-critical Code

*
  • H
Out-of-bounds Write

*
  • H
Expired Pointer Dereference

*
  • H
Trust Boundary Violation

*
  • M
Expired Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • H
Use of Out-of-range Pointer Offset

*
  • H
Expired Pointer Dereference

*
  • H
HTTP Request Smuggling

*
  • H
Out-of-bounds Write

*
  • H
Expired Pointer Dereference

*
  • H
Incorrect Calculation of Buffer Size

*
  • H
Race Condition

*
  • M
Authentication Bypass

*
  • M
CVE-2025-14329

*
  • M
Out-of-bounds Write

*
  • M
CVE-2025-14330

*
  • H
CVE-2025-14323

*
  • M
Origin Validation Error

*
  • H
CVE-2025-14324

*
  • H
CVE-2025-14322

*
  • M
CVE-2025-14328

*
  • H
Use After Free

*
  • L
Authentication Bypass

*
  • M
Expired Pointer Dereference

*
  • M
Origin Validation Error

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Trust Boundary Violation

*
  • M
Expired Pointer Dereference

*
  • H
Out-of-bounds Write

*
  • H
Race Condition

*
  • H
Out-of-bounds Write

*
  • H
Use After Free

*
  • M
Interpretation Conflict

*
  • H
Out-of-Bounds

*
  • H
Improper Access Control

*
  • H
Out-of-Bounds

*
  • H
Exposure of System Data to an Unauthorized Control Sphere

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
CVE-2025-10529

*
  • H
Access of Uninitialized Pointer

*
  • H
CVE-2025-10537

*
  • L
CVE-2025-10536

*
  • H
Use After Free

*
  • H
Out-of-Bounds

*
  • M
Improper Initialization

*
  • H
Out-of-Bounds

*
  • H
Information Exposure

*
  • M
Arbitrary Code Injection

*
  • M
Incorrect Default Permissions

*
  • M
Cross-site Scripting (XSS)

*
  • H
Out-of-Bounds

*
  • M
Protection Mechanism Failure

*
  • H
Use of Uninitialized Variable

*
  • L
NULL Pointer Dereference

*
  • H
Insufficient Protection Against Instruction Skipping Via Fault Injection

*
  • H
Out-of-Bounds

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Use of Incorrectly-Resolved Name or Reference

*
  • H
Use After Free

*
  • H
Double Free

*
  • M
Inclusion of Functionality from Untrusted Control Sphere

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Improper Encoding or Escaping of Output

*
  • M
Inclusion of Functionality from Untrusted Control Sphere

*
  • L
Improper Restriction of Rendered UI Layers or Frames

*
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

*